A Survey of Microarchitecture Support for Embedded Processor Security

作者: Arun K. Kanuparthi , Ramesh Karri , Gaston Ormazabal , Sateesh K. Addepalli

DOI: 10.1109/ISVLSI.2012.64

关键词:

摘要: The number of attacks on embedded processors is the rise. Attackers exploit vulnerabilities in software to launch new and get unauthorized access sensitive information stored these devices. Several solutions have been proposed by both academia industry protect programs running embedded-processor based computer systems. After a description several that threaten system, this paper surveys existing defenses - software-based hardware-based (watchdog checkers, integrity trees, memory encryption, modification processor architecture), against such attacks. This also provides comparative discussion their advantages disadvantages.

参考文章(16)
A.M. Fiskiran, R.B. Lee, Runtime execution monitoring (REM) to detect and prevent malicious code execution international conference on computer design. pp. 452- 457 ,(2004) , 10.1109/ICCD.2004.1347961
Perry Wagle, Jonathan Walpole, Calton Pu, Steve Beattie, Aaron Grier, Crispin Cowan, Heather Hintony, Qian Zhang, Peat Bakke, Dave Maier, StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks usenix security symposium. pp. 5- 5 ,(1998)
James Cheney, Michael W. Hicks, Yanling Wang, Dan Grossman, J. Greg Morrisett, Trevor Jim, Cyclone: A Safe Dialect of C usenix annual technical conference. pp. 275- 288 ,(2002)
Schuette, Shen, Processor Control Flow Monitoring Using Signatured Instruction Streams IEEE Transactions on Computers. ,vol. 36, pp. 264- 276 ,(1987) , 10.1109/TC.1987.1676899
Najwa Aaraj, Anand Raghunathan, Niraj K. Jha, Srivaths Ravi, Energy and execution time analysis of a software-based trusted platform module design, automation, and test in europe. pp. 1128- 1133 ,(2007) , 10.5555/1266366.1266610
N.R. Saxena, E.J. McCluskey, Linear complexity assertions for sorting IEEE Transactions on Software Engineering. ,vol. 20, pp. 424- 431 ,(1994) , 10.1109/32.295891
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis, Countering code-injection attacks with instruction-set randomization computer and communications security. pp. 272- 280 ,(2003) , 10.1145/948109.948146
Darko Kirovski, Milenko Drinić, Miodrag Potkonjak, Enabling trusted software integrity Tenth international conference on architectural support for programming languages and operating systems on Proceedings of the 10th international conference on architectural support for programming languages and operating systems (ASPLOS-X) - ASPLOS '02. ,vol. 37, pp. 108- 120 ,(2002) , 10.1145/605397.605409
Saman P. Amarasinghe, Vladimir Kiriansky, Derek Bruening, Secure Execution via Program Shepherding usenix security symposium. pp. 191- 206 ,(2002)
J.G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S.W. Smith, Building the IBM 4758 secure coprocessor IEEE Computer. ,vol. 34, pp. 57- 66 ,(2001) , 10.1109/2.955100